heroui logo

Windows User Execution Malicious URL Shortcut File

Splunk Security Content

View Source
Summary
The analytic rule detects the creation of suspicious URL shortcut files, which can indicate an attempt by malware, such as CHAOS ransomware, to execute malicious code. It utilizes the Endpoint.Filesystem datamodel to monitor for .url files created outside of recognized directories, primarily those not in 'Program Files'. These indicators are critical as they may reflect a strategy by attackers to maintain persistence on a system and execute harmful payloads, potentially leading to system compromise and data exfiltration. The search query outlined in the rule captures these anomalies by filtering filesystem events and specifying certain file characteristics, thus alerting to potentially dangerous activities that compromise endpoint security.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Process
  • File
ATT&CK Techniques
  • T1204
  • T1204.002
Created: 2024-11-13